Patents Examined by Paul J Skwierawski
-
Patent number: 11947714Abstract: An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to receive, using the wireless communication module, a secure unlock command from a remote server, the secure unlock command being generated when a remote service device transmits appliance identification data to the remote server, and unlock the external communication port to permit the remote service device to access operating software through the external communication port.Type: GrantFiled: November 9, 2021Date of Patent: April 2, 2024Assignee: Haier US Appliance Solutions, Inc.Inventors: Ryan James Scheckelhoff, Richard Dean Suel, II, John Gilman Chapman, Jr.
-
Patent number: 11900306Abstract: Embodiments are provided for tracking physical transfers of tokenized physical assets. A transferor request to transfer a digital token from a first address associated with the first computing device to a second address associated with a second computing device may be received by a first computing device, where the digital token corresponds to a unique identifier associated with a physical asset. The first computing device communicates the received transferor request including at least a first location parameter, determined by the first computing device based on signals received at a physical location thereof, to at least one node of a distributed ledger network. The first computing device receives a confirmation that the transfer of the digital token is approved based on a determination that a transferee request from the second computing device includes at least a second location parameter corresponding to the physical location of the first computing device.Type: GrantFiled: July 5, 2018Date of Patent: February 13, 2024Assignee: UNITED PARCEL SERVICE OF AMERICA, INC.Inventor: Robert J. Gillen
-
Patent number: 11880451Abstract: Systems, methods, and software can be used for securing injected codes of a browser plugin. One example of a method includes establishing a code package to be injected into a web page. The code package comprises at least one element, and the at least one element includes a first script to be executed before executing a code of the web page. The method further includes injecting the at least one element to the web page to execute the first script. The execution of the first script comprises generating a script element comprising one or more secrets. The method further comprises appending the script element to the web page and deleting the script element from the web page.Type: GrantFiled: January 29, 2021Date of Patent: January 23, 2024Assignee: BlackBerry LimitedInventor: Nick Ehli Cano
-
Patent number: 11874945Abstract: A method and a system for dynamically scanning, filtering, and blocking harmful database queries that would otherwise consume significant resources and adversely impact overall system performance are provided. The method includes: receiving a user request for data from a database, the first request including a query; applying database access rules to the query in order to determine whether the query is potentially harmful; when the query is determined as not potentially harmful, forwarding the request to a server configured to respond to the request; and when the first query is determined as being potentially harmful, transmitting a warning message to the user. The database access rules may include a maximum memory consumption rule and a maximum CPU consumption rule. Machine learning techniques are used for adjusting the database access rules based on historical data.Type: GrantFiled: July 15, 2020Date of Patent: January 16, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Robert MacAndrew, Miklos Kalman, Joel Klein
-
Patent number: 11847244Abstract: A private information detector for data loss prevention is described.Type: GrantFiled: August 20, 2019Date of Patent: December 19, 2023Assignee: Shoreline Labs, Inc.Inventors: Isaac Abhay Madan, Rohan Shrikant Sathe, Trung Hoai Nguyen, Yiang Zheng
-
Patent number: 11824884Abstract: Systems, computer program products, and methods are described herein for generating responsive actions based on unauthorized access events associated with imitation networks. The present invention is configured to retrieve information associated with unauthorized access attempts associated with an imitation dataset; generate penetration test scenarios based on at least the types of unauthorized access attempts; initiate the penetration test scenarios on real datasets stored in data repositories within a network environment; determine automated network security responses to the penetration test scenarios; determine the unauthorized access attempts that were not successfully blocked and/or reported; determine actions to be executed in response to the unauthorized access attempts that were not successfully blocked and/or reported; and update the network security features with the actions.Type: GrantFiled: October 5, 2020Date of Patent: November 21, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Nia Mack
-
Patent number: 11757631Abstract: An apparatus for releasing received command data includes a processor unit with a code generator, a cryptography module, and a comparison module. The code generator generates a transaction code. The apparatus has a transmitting unit which provides the transaction code via an unsecured data connection, a receiving unit which receives an external authentication code and command data via the unsecured data connection, and a memory unit which stores data of a predefined private key. Also disclosed is a transmission apparatus for command data. The transmission apparatus has a basic receiving unit which receives the transaction code, an input unit which receives the command data, a basic memory unit which stores the data of the predefined private key, a basic processor unit which has a basic cryptography module, and a basic transmitting unit which provides the external authentication code and the command data via the unsecured data connection.Type: GrantFiled: February 19, 2019Date of Patent: September 12, 2023Assignee: Airbus Defence and Space GmbHInventors: Thomas Heuer, Riqaq Woolnough
-
Patent number: 11748482Abstract: An information processing apparatus that successively activates a plurality of modules, comprises a first module, a second module, and a third module. The first module activates the second module which has been verified, and the second module activates the third module which has been verified. The first module includes verification information used for verifying both of the second module and the third module, verifies the second module using the verification information and verifies the third module using the verification information.Type: GrantFiled: March 21, 2019Date of Patent: September 5, 2023Assignee: Canon Kabushiki KaishaInventor: Yoshiharu Ito
-
Patent number: 11734259Abstract: An example operation may include one or more of generating, by an executing client, a blockchain transaction comprising an anonymous rating, a proof, a nullifier, and a root node value, receiving, by a smart contract, the blockchain transaction, the anonymous rating related to an authorizing client, verifying the proof with the root node value and the nullifier, verifying that the root node value is a current or a previous merkle tree root node value, adding the anonymous rating to a shared ledger, marking the nullifier as used, and storing the marked nullifier to the shared ledger.Type: GrantFiled: May 31, 2019Date of Patent: August 22, 2023Assignee: International Business Machines CorporationInventors: Rishi Saket, Pankaj S. Dayama, Nitin Singh
-
Patent number: 11601286Abstract: A signature verification platform includes: a locale classifying engine configured to decide a style of a signature by applying machine learning-based classification techniques to the signature that is input to the locale classifying engine; a parameter profile generating section configured to select a verification profile which suits the style decided by the locale classifying engine; and a verification engine configured to verify the signature using the verification profile selected by the parameter profile generating section.Type: GrantFiled: August 19, 2020Date of Patent: March 7, 2023Assignee: Wacom Co., Ltd.Inventor: Joss Daniel Giffard-Burley
-
Patent number: 11575692Abstract: To detect identity spray attacks, a machine learning model classifies account access attempts as authorized or unauthorized, based on dozens of different pieces of information (machine learning model features). Boosted tree, neural net, and other machine learning model technologies may be employed. Model training data may include user agent reputation data, IP address reputation data, device or agent or location familiarity indications, protocol identifications, aggregate values, and other data. Account credential hash sets or hash lists may serve as model inputs. Hashes may be truncated to further protect user privacy. Classifying an access attempt as unauthorized may trigger application of multifactor authentication, password change requirements, account suspension, or other security enhancements. Statistical or heuristic detections may supplement the model.Type: GrantFiled: December 4, 2020Date of Patent: February 7, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Sergio Romero Zambrano, Andrew Numainville, Maria Puertas Calvo, Abbinayaa Subramanian, Pui Yin Winfred Wong, Dana S. Kaufman, Eliza Kuzmenko
-
Patent number: 11569993Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: October 10, 2018Date of Patent: January 31, 2023Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11526608Abstract: Methods and systems for determining an affiliation of a given software with target software are provided. The method comprises: receiving a software source code of the given software; executing the software source code in an isolated program environment to identify at least one outgoing request of the given software, the at least one outgoing request being indicative of at least one respective function of the software source code; generating, based on the at least one outgoing request, a respective function identifier associated with the at least one respective function; applying at least one classifier to the respective function identifier to determine a likelihood parameter indicative of the given software being affiliated to a respective target software; in response to the likelihood parameter being equal to or greater than a predetermined likelihood parameter threshold: identifying the given software as being affiliated to the respective target software.Type: GrantFiled: October 22, 2020Date of Patent: December 13, 2022Assignee: GROUP IB TDS, LTDInventors: Pavel Vladimirovich Slipenchuk, Ilia Sergeevich Pomerantsev